Search Results - (( utilization interest protocol algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…The paper findings are, PA-UDP protocol has the best transport performance but it requires high CPU utilization during the start and end of transmission at the receiver side. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap by Masirap, Madzirin

    Published 2014
    “…The paper findings are, PA-UDP protocol has the best transport performance but it requires high CPU utilization during the start and end of transmission at the receiver side. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2009
    “…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
    Get full text
    Get full text
    Article
  5. 5

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…One of the major protocols of our interest is MAC protocol. Different contention-based MAC Protocols for Wireless Sensor Networks (WSNs) have been proposed over the last few years. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study by Karim, M.K.A., Khalidi, M. E., Chew, M. T., Kechik, M. M. A., Mazlan, D., Ng, K. H.

    Published 2023
    “…TTF and CNR are considered the most important performance measures for protocol optimisation as they enhance the contrast and spatial resolution for the background and region of interest.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm by Muhsen, Yousif Raad, Husin, Nor Azura, Zolkepli, Maslina, Manshor, Noridayu, Al-Hchaimi, Ahmed Abbas Jasim, Ridha, Hussein Mohammed

    Published 2023
    “…The main idea of the proposed method is to develop a prediction model, speci‚cally an Arti‚cial Neural Network (ANN) optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN), for predicting the utilized routing algorithm in NoC-based MPSoC platform during the DSE process. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15
  16. 16

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
    Get full text
    Get full text
    Thesis